mirror of
https://github.com/42wim/matterbridge.git
synced 2024-11-16 00:49:26 +01:00
165 lines
4.6 KiB
Go
165 lines
4.6 KiB
Go
|
// Copyright (c) 2015-present Mattermost, Inc. All Rights Reserved.
|
||
|
// See License.txt for license information.
|
||
|
|
||
|
package model
|
||
|
|
||
|
import (
|
||
|
"encoding/json"
|
||
|
"fmt"
|
||
|
"io"
|
||
|
"net/http"
|
||
|
"unicode/utf8"
|
||
|
)
|
||
|
|
||
|
const (
|
||
|
OAUTH_ACTION_SIGNUP = "signup"
|
||
|
OAUTH_ACTION_LOGIN = "login"
|
||
|
OAUTH_ACTION_EMAIL_TO_SSO = "email_to_sso"
|
||
|
OAUTH_ACTION_SSO_TO_EMAIL = "sso_to_email"
|
||
|
OAUTH_ACTION_MOBILE = "mobile"
|
||
|
)
|
||
|
|
||
|
type OAuthApp struct {
|
||
|
Id string `json:"id"`
|
||
|
CreatorId string `json:"creator_id"`
|
||
|
CreateAt int64 `json:"create_at"`
|
||
|
UpdateAt int64 `json:"update_at"`
|
||
|
ClientSecret string `json:"client_secret"`
|
||
|
Name string `json:"name"`
|
||
|
Description string `json:"description"`
|
||
|
IconURL string `json:"icon_url"`
|
||
|
CallbackUrls StringArray `json:"callback_urls"`
|
||
|
Homepage string `json:"homepage"`
|
||
|
IsTrusted bool `json:"is_trusted"`
|
||
|
}
|
||
|
|
||
|
// IsValid validates the app and returns an error if it isn't configured
|
||
|
// correctly.
|
||
|
func (a *OAuthApp) IsValid() *AppError {
|
||
|
|
||
|
if len(a.Id) != 26 {
|
||
|
return NewAppError("OAuthApp.IsValid", "model.oauth.is_valid.app_id.app_error", nil, "", http.StatusBadRequest)
|
||
|
}
|
||
|
|
||
|
if a.CreateAt == 0 {
|
||
|
return NewAppError("OAuthApp.IsValid", "model.oauth.is_valid.create_at.app_error", nil, "app_id="+a.Id, http.StatusBadRequest)
|
||
|
}
|
||
|
|
||
|
if a.UpdateAt == 0 {
|
||
|
return NewAppError("OAuthApp.IsValid", "model.oauth.is_valid.update_at.app_error", nil, "app_id="+a.Id, http.StatusBadRequest)
|
||
|
}
|
||
|
|
||
|
if len(a.CreatorId) != 26 {
|
||
|
return NewAppError("OAuthApp.IsValid", "model.oauth.is_valid.creator_id.app_error", nil, "app_id="+a.Id, http.StatusBadRequest)
|
||
|
}
|
||
|
|
||
|
if len(a.ClientSecret) == 0 || len(a.ClientSecret) > 128 {
|
||
|
return NewAppError("OAuthApp.IsValid", "model.oauth.is_valid.client_secret.app_error", nil, "app_id="+a.Id, http.StatusBadRequest)
|
||
|
}
|
||
|
|
||
|
if len(a.Name) == 0 || len(a.Name) > 64 {
|
||
|
return NewAppError("OAuthApp.IsValid", "model.oauth.is_valid.name.app_error", nil, "app_id="+a.Id, http.StatusBadRequest)
|
||
|
}
|
||
|
|
||
|
if len(a.CallbackUrls) == 0 || len(fmt.Sprintf("%s", a.CallbackUrls)) > 1024 {
|
||
|
return NewAppError("OAuthApp.IsValid", "model.oauth.is_valid.callback.app_error", nil, "app_id="+a.Id, http.StatusBadRequest)
|
||
|
}
|
||
|
|
||
|
for _, callback := range a.CallbackUrls {
|
||
|
if !IsValidHttpUrl(callback) {
|
||
|
return NewAppError("OAuthApp.IsValid", "model.oauth.is_valid.callback.app_error", nil, "", http.StatusBadRequest)
|
||
|
}
|
||
|
}
|
||
|
|
||
|
if len(a.Homepage) == 0 || len(a.Homepage) > 256 || !IsValidHttpUrl(a.Homepage) {
|
||
|
return NewAppError("OAuthApp.IsValid", "model.oauth.is_valid.homepage.app_error", nil, "app_id="+a.Id, http.StatusBadRequest)
|
||
|
}
|
||
|
|
||
|
if utf8.RuneCountInString(a.Description) > 512 {
|
||
|
return NewAppError("OAuthApp.IsValid", "model.oauth.is_valid.description.app_error", nil, "app_id="+a.Id, http.StatusBadRequest)
|
||
|
}
|
||
|
|
||
|
if len(a.IconURL) > 0 {
|
||
|
if len(a.IconURL) > 512 || !IsValidHttpUrl(a.IconURL) {
|
||
|
return NewAppError("OAuthApp.IsValid", "model.oauth.is_valid.icon_url.app_error", nil, "app_id="+a.Id, http.StatusBadRequest)
|
||
|
}
|
||
|
}
|
||
|
|
||
|
return nil
|
||
|
}
|
||
|
|
||
|
// PreSave will set the Id and ClientSecret if missing. It will also fill
|
||
|
// in the CreateAt, UpdateAt times. It should be run before saving the app to the db.
|
||
|
func (a *OAuthApp) PreSave() {
|
||
|
if a.Id == "" {
|
||
|
a.Id = NewId()
|
||
|
}
|
||
|
|
||
|
if a.ClientSecret == "" {
|
||
|
a.ClientSecret = NewId()
|
||
|
}
|
||
|
|
||
|
a.CreateAt = GetMillis()
|
||
|
a.UpdateAt = a.CreateAt
|
||
|
}
|
||
|
|
||
|
// PreUpdate should be run before updating the app in the db.
|
||
|
func (a *OAuthApp) PreUpdate() {
|
||
|
a.UpdateAt = GetMillis()
|
||
|
}
|
||
|
|
||
|
// ToJson convert a User to a json string
|
||
|
func (a *OAuthApp) ToJson() string {
|
||
|
b, _ := json.Marshal(a)
|
||
|
return string(b)
|
||
|
}
|
||
|
|
||
|
// Generate a valid strong etag so the browser can cache the results
|
||
|
func (a *OAuthApp) Etag() string {
|
||
|
return Etag(a.Id, a.UpdateAt)
|
||
|
}
|
||
|
|
||
|
// Remove any private data from the app object
|
||
|
func (a *OAuthApp) Sanitize() {
|
||
|
a.ClientSecret = ""
|
||
|
}
|
||
|
|
||
|
func (a *OAuthApp) IsValidRedirectURL(url string) bool {
|
||
|
for _, u := range a.CallbackUrls {
|
||
|
if u == url {
|
||
|
return true
|
||
|
}
|
||
|
}
|
||
|
|
||
|
return false
|
||
|
}
|
||
|
|
||
|
// OAuthAppFromJson will decode the input and return a User
|
||
|
func OAuthAppFromJson(data io.Reader) *OAuthApp {
|
||
|
var app *OAuthApp
|
||
|
json.NewDecoder(data).Decode(&app)
|
||
|
return app
|
||
|
}
|
||
|
|
||
|
func OAuthAppMapToJson(a map[string]*OAuthApp) string {
|
||
|
b, _ := json.Marshal(a)
|
||
|
return string(b)
|
||
|
}
|
||
|
|
||
|
func OAuthAppMapFromJson(data io.Reader) map[string]*OAuthApp {
|
||
|
var apps map[string]*OAuthApp
|
||
|
json.NewDecoder(data).Decode(&apps)
|
||
|
return apps
|
||
|
}
|
||
|
|
||
|
func OAuthAppListToJson(l []*OAuthApp) string {
|
||
|
b, _ := json.Marshal(l)
|
||
|
return string(b)
|
||
|
}
|
||
|
|
||
|
func OAuthAppListFromJson(data io.Reader) []*OAuthApp {
|
||
|
var o []*OAuthApp
|
||
|
json.NewDecoder(data).Decode(&o)
|
||
|
return o
|
||
|
}
|